CCSF COMPUTER USAGE POLICY

Copies of this CCSF Computer Usage Policy can be found in the college
catalogue and the employee's handbook, and on the college website: http://www.ccsf.edu/Policy/policy.html. Each user who uses the CCSF
computing facilities and resources is bound by this policy.

Violation of these policies will be dealt with in the same manner as
violations of other College policies and may result in disciplinary review. In
such a review the full range of disciplinary sanctions is available including
the loss of computer use privileges, dismissal from the College, and legal
action. Violations of some of the policies below may constitute a criminal
offense.

Rights and Responsibilities

CCSF makes computer accounts and resources available for student use in the pursuit of instructional goals, and to faculty and staff to support the institution's mission.

The Computer Usage Policy applies to all users of the CCSF computing resources. This includes administrators, faculty, staff, students and guests on District equipment and networks.

Computer accounts and computer access are privileges, and require the
individual user to act responsibly. By using the CCSF accounts, users have
agreed to respect the rights of other users and accounts, to use the account
only for school-related purposes, and to safeguard the integrity of the system
and its related physical resources. Users have further agreed to observe all
relevant laws, regulations, policies and contractual obligations of the
College.

Other organizations operating computing and network facilities that are
reachable via the City College network may have their own policies governing
the use of those resources. When accessing remote resources from City College
facilities, users are responsible for obeying both the policies set forth in
this document and the policies of the other organizations. It is the user's
responsibility to be informed of the policies of other outside organizations
to which they establish a computer link.

Confidentiality

CCSF does NOT guarantee or warrantee the confidentiality of user files, including e-mail, except where legally or contractually protected. It is the practice of Information Technology Services (ITS) to respect the confidential nature of user files, but the ITS Department reserves the right to view or alter user files when it is necessary. Any ITS employee must have permission from the appropriate Vice Chancellor prior to investigating or modifying a user file.

User files may also be subject to search under court order if such files are
suspected of containing information that could be used as evidence in a Court
of law. Student files as kept on ITS facilities are considered educational
records as covered by the Family Educational Rights and Privacy Act of 1974
(Title 20, Section 1232(g) of the United States Code, also referred to as the
Buckley Amendment).

In addition, a system administrator may access user files as required to
protect the integrity of the computer system. For example, system
administrators may access or examine files or accounts that are suspected of
unauthorized use or misuse, or that have been corrupted or damaged.

Existing Legal Context

All existing federal and state laws and College regulations apply, including
not only those laws and regulations that are specific to computers and
networks, but also those that may apply generally to personal conduct.

Misuse of computing, networking or information resources may result in the loss
of computing and/or network privileges without notice. This includes both those
that ITS administers, and those that may exist in other departments associated
with City College of San Francisco and connected to its network.
Deliberate violations of these policies will be dealt with in the same manner
as violations of other college policies and may result in disciplinary
sanctions including, but not limited to, loss of computer use privileges,
dismissal from the college, and/or appropriate legal action.

Additionally, misuse can be prosecuted under applicable statutes. Users may be
held accountable for their conduct under any applicable College or campus
policies, procedures, or collective bargaining agreements. Complaints alleging
misuse of the College's computing resources will be directed to those responsible
for taking appropriate disciplinary action as specified under Enforcement below.
Illegal reproduction of software protected by U.S. Copyright Law is subject to
civil damages and criminal penalties including fines and imprisonment
(See CCSF Policy Manual 8.10).

Copyright

All users must follow all relevant copyright laws. US Copyright law governs printing, scanning, reproduction, and distribution of software and other material in print or online, including text, fonts, graphics, sound, video and others
The End User License Agreement (EULA) for a product specifies the conditions under which a user may copy or install the product.
The EULA also specifies the number of simultaneous users licensed to use the
product.
http://www.ccsf.org/Policy/Copyright/

Nondiscrimination

All computer users must follow the Unlawful Discrimination and Harassment Policy as stated
in the CCSF "Equal Opportunity Statement" listed in the catalog.
;
(EDUCATION CODE SECTION 66270-66271.1)

Any user who files a complaint or otherwise protests against discrimination has
the right to be free from any retaliatory action because of the complaint or
protest. The CCSF administrator who receives a complaint of discrimination
should inform the complainant of this right and that the complainant may file
an additional complaint if he or she experiences retaliatory
conduct.

Examples of misuse include, but are not limited to, the following activities:

Breaking into another person's account

Using a computer account that you are not authorized to use by the ITS
Department. Knowingly or carelessly allowing someone else to use your account.

Obtaining a password for a computer account that is not your own account.

Using the Campus Network to gain unauthorized access to any computer
systems.

Posting on Internet services information that may be slanderous or
defamatory in nature.

Displaying sexually explicit, graphically disturbing, or sexually harassing
images or text in a public computer facility, or location that can potentially
be in view of other individuals, except when directly related to CCSF coursework.

Commercial use

Using your account for any activity that is commercial in nature.
Commercial activities include, but are not limited to, consulting, typing
services, and developing software for sale. Account use to purchase textbooks and course materials, etc. is permitted

Attempting to monitor or tamper with another user's electronic
communications, or reading, copying, changing, or deleting another user's files
or software without the explicit agreement of the owner. Files owned by
individual users are to be considered private property, whether or not they are
accessible by other users.

Modifying of another user's files, which is illegal under California Computer
Crime Laws.

System misuse

Sending mass e-mail to a large number of people on the system. It is
acceptable, however, to use organization or department mailing lists,
listserves, to send e-mail to groups of people on the system.

Knowingly or carelessly performing an act that will interfere with the
normal operation of computer systems, including running, or installing, or
giving to another user a program intended to damage or to place excessive
load on a computer system or network. This includes programs known as
computer viruses and worms.

Deliberately wasting/overloading system resources, such as:

Printing resources - This includes, but is
not limited to, printing multiple copies of a document or printing out large
documents that may be available on-line, or that might impact significantly on
other users printing resources.

System file space - Storing or transferring of large files or using a large
amount of file space in the temporary file system area which degrades overall
system performance or preclude other users right of access to disk storage also
constitute misuse of resources. The ITS staff may remove or compress disk files
that are consuming large amounts of disk space, with or without prior notification.

Additional System Information

Batch jobs or background tasks should be consistent with individual academic
goals or institutional academic goals.
Jobs that do not coincide with the academic goals of the institution and/or cause IT system problems may be "killed" without warning, and the owner of the job will be notified.

Any files stored in the temporary file systems are not backed up and are
subject to deletion at any time. Users' file names and directory names
starting with a period or another punctuation or special character will be
deleted immediately.

Enforcement

After the appropriate investigation and/or hearing procedures have been
followed, the penalties below may be imposed under one or more of the
following:
City College regulations, California law, the laws of the United States.

Infractions of the CCSF Computer Policy may result in the temporary
or permanent loss or modification of computer account and resource access
privileges, and may be subject to further disciplinary action.

Offenses which may be in violation of local, state or federal laws
will result in the immediate loss of all computer account and resource
privileges, and will be reported to the appropriate College or institution
involved and law enforcement authorities.
An individual's computer use privileges may be suspended immediately upon the
discovery of a possible violation of these policies. Such suspected violations
will be confidentially reported to the appropriate supervisors or
instructor and/or department chair.

This document is subject to revision. The Information Technology Advisory Committee (ITAC)
approves changes to the guidelines, as needed.